Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/07/2024, 11:08

General

  • Target

    9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe

  • Size

    1.2MB

  • MD5

    496a8adbba26ad659a82985bb67dd85d

  • SHA1

    a2026f727f69df0c156b6ce0569e86fc36faebe5

  • SHA256

    9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40

  • SHA512

    8817867174cb2e341515e31d218eb2059ed56909328e38b009b728b359703610a26fa571f6ec87ac81e28e828765ba121b4f9f6d11ff78e047a406725b667aad

  • SSDEEP

    24576:idFMCC3AST5LLbFFUqlMvTzvLsx+4QhbCxKV/4n:olC35DUFXQg4QJCoV/2

Score
10/10

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    framework.pcsoft.fr
  • Port:
    21
  • Username:
    framework
  • Password:
    framework

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe
    "C:\Users\Admin\AppData\Local\Temp\9d5309067fafad8cfc5cda722b2315a276cade0e375318f50a669ffae019da40.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3264
    • C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe
      "C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe" /REP="C:\Users\Admin\AppData\Local\Temp\" /SILENT
      2⤵
      • Executes dropped EXE
      PID:4424

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\InstallFramework.exe

    Filesize

    15.5MB

    MD5

    0727189ee363736e77fdf71d94a7e71e

    SHA1

    e259f9e5467a9d0d72da1f16bcd89eef0c05f3d4

    SHA256

    fc74f1e4cd9c6593799b4834f87869b2d545cd713b8135ad92eeb388467afb42

    SHA512

    a16fd73b90ed32806f7cb7e9aaea81cc2eb0b8742d965803cce2aa441948a31efda781c2ea32bb91702c315419e3d8630a9067d7e2f8a5fca0fba0887d716ab9

  • C:\Users\Admin\AppData\Local\Temp\WD150HF.DLL

    Filesize

    2.6MB

    MD5

    3dcd002f7c4cc07db207954721de8c08

    SHA1

    da2b437491bf7f3183c49add76132e305dd91998

    SHA256

    5b309a42caa40d7591c112806084c9b156bfb23b59e7854ca1f9d6ab93d1caeb

    SHA512

    04e41803d7ca266962581c5ecec24f7e5d7efdc770da26d58188fb731858078857f69e3a7f3756d2477b01c42ae417a8fb5d19466a54a1a581051ee146a637ab

  • C:\Users\Admin\AppData\Local\Temp\WD150OBJ.DLL

    Filesize

    3.2MB

    MD5

    5a0b2319464811478e46b9d474559c6b

    SHA1

    31be25dc10e07b51627c842f22ac19bc87302655

    SHA256

    4a3dddc6dfd21381d940fb6e43994af368082f82fb782c06b80d65dc3af34703

    SHA512

    69d5f21832eb22b2292f09fcc49e6b435c9832bf0bc927e36804882445af2051006e0c3cafc7bdd226e49fcb731746bb1790e82bcbdf5269e3ccbc7e84f8427c

  • C:\Users\Admin\AppData\Local\Temp\WD150VM.DLL

    Filesize

    2.3MB

    MD5

    03d44b2f98b3bb738b6fc6dd9e3506bd

    SHA1

    a9a7edebb8f97ea159c24158a0e2c2ea5d030c70

    SHA256

    a79e315d7babb618acc2470a8d074738c088901a894b82e928a351ba9e5d1ca3

    SHA512

    d0a4849d18a43c240799eb1306a69f504744321c5665cac43159a393d229b22055a968ec365d118176bb3eda697e3e9a13012f2a627143acccacb51298557fdf

  • C:\Users\Admin\AppData\Local\Temp\wd150std.dll

    Filesize

    728KB

    MD5

    0f2941d8ba3b515086d7433f333c16e9

    SHA1

    ac423ab8c846a78a215d5dfd0280cf8597ee670c

    SHA256

    9b2042f697a3a62430a26f0e164a95e912afc3a9b7e48f691f16001fdd907732

    SHA512

    5223130d18f329ca590cb67898f339de18bc9858df5cbff089a1b7f5ecdb3fb09301fef1c0e4c0d450750b91a9a4c99f21318edb5abd1a90105c609f37c2309d